CNN-Based Model for Copy Detection Pattern Estimation and Authentication

  • Syukron Abu Ishaq Alfarozi Universitas Gadjah Mada
  • Azkario Rizky Pratama Universitas Gadjah Mada
Keywords: Copy Detection Pattern, Convolutional Neural Network, Anti-Counterfeiting

Abstract

Counterfeiting has been one of the crimes of the 21st century. One of the methods to overcome product counterfeiting is a copy detection pattern (CDP) stamped on the product. CDP is a copy-sensitive pattern that leads to quality degradation of the pattern after the print and scan process. The amount of information loss is used to distinguish between original and fake CDPs. This paper proposed a CDP estimation model based on the convolutional neural network (CNN), namely, CDP-CNN. The CDP-CNN addresses the spatial dependency of the image patch. Thus, it should be better than the state-of-the-art model that uses a multi-layer perceptron (MLP) architecture. The proposed model had an estimation bit error rate (BER) of 9.91% on the batch estimation method. The error rate was 9% lower than the previous method that used an autoencoder MLP model. The proposed model also had a lower number of parameters compared to the previous method. The effect of preprocessing, namely the use of an unsharp mask, was tested using a statistical testing method. The effect of preprocessing had no significant difference except in the batch estimation scheme where the unsharp mask filter reduced the error rate by at least 0.5%. In addition, the proposed model was also used for the authentication method. The authentication using the estimation model had a good separation distribution to distinguish the fake and original CDPs. Thus, the CDP can still be used as the authentication method with reliable performance. It helps anti-counterfeiting on product distribution and reduces negative impacts on various sectors of the economy.

References

E. Gasiorowski-Denis (2014) “Crackdown on counterfeiting,” [Online], https://www.iso.org/news/2014/01/Ref1809.html, access date: 26-Jul-2022.

L. Korsell, “Fraud in the Twenty-First Century,” Eur. J. Crim. Policy Res., Vol. 26, No. 3, pp. 285–291, Aug. 2020, doi: 10.1007/s10610-020-09463-2.

OEICD/EUIPO (2016) “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact,” [Online], https://read.oecd-ilibrary.org/governance/trade-in-counterfeit-and-pirated-goods_9789264252653-en#page5, access date: 26-Jul-2022.

A. Anderson (2006) “Combating Counterfeiting: Simple Steps You Can Take Now to Protect Your Brand from Piracy,” [Online], https://www.hollandhart.com/articles/CounterfeitingArticleAndersonRev2.pdf, access date: 26-Jul-2022.

J. Picard, “Digital Authentication with Copy-Detection Patterns,” Proc. Vol. 5310 Opt. Secur. Counterfeit Deterrence Tech. V, R.L. van Renesse, Ed., Jun. 2004, pp. 176–183, doi: 10.1117/12.528055.

C. Chen et al., “A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models,” IEEE Trans. Inf. Forensics, Secur., Vol. 15, pp. 1056–1071, Aug. 2019, doi: 10.1109/TIFS.2019.2934861.

I.H. Sarker, “Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions,” SN Comput. Sci., Vol. 2, No. 6, pp. 1–20, Nov. 2021, doi: 10.1007/s42979-021-00815-1.

P.R. Kumar and E.B.K. Manash, “Deep Learning: A Branch of Machine Learning,” J. Phys. Conf. Ser., Vol. 1228, pp. 1–9, May 2019, doi: 10.1088/1742-6596/1228/1/012045.

K. Choudhary et al., “Recent Advances and Applications of Deep Learning Methods in Materials Science,” npj Comput. Mater., Vol. 8, pp. Apr. 2022, doi: 10.1038/s41524-022-00734-6.

V. Kober, T. Choi, V. Diaz-Ramírez, and P. Aguilar-González, “Pattern Recognition: Recent Advances and Applications,” Math. Probl. Eng., Vol. 2018, pp. 1–2, 2018, doi: 10.1155/2018/8510319.

B. Liu and J. Liu, “Overview of Image Denoising Based on Deep Learning,” J. Phys. Conf. Ser., Vol. 1176, No. 2, pp. 1–6, Mar. 2019, doi: 10.1088/1742-6596/1176/2/022010.

K. Yun, A. Huyen, and T. Lu, “Deep Neural Networks for Pattern Recognition,” 2018, arXiv:1809.09645.

E. Khermaza, I. Tkachenko, and J. Picard, “Can Copy Detection Patterns be Copied? Evaluating the Performance of Attacks and Highlighting the Role of the Detector,” 2021 IEEE Int. Workshop Inf. Forensics, Secur. (WIFS), 2021, pp. 1–6, doi: 10.1109/WIFS53200.2021.9648384.

P. Zhang, W. Zhang, and N. Yu, “Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features,” 2019 7th Int. Conf. Infor. Commun., Netw. (ICICN), 2019, pp. 150–157, doi: 10.1109/ICICN.2019.8834939.

O. Taran et al.,“Mobile Authentication of Copy Detection Patterns: How Critical Is to Know Fakes?” 2021 IEEE Int. Workshop Inf. Forensics, Secur. (WIFS), 2021, pp. 1–6, doi: 10.1109/WIFS53200.2021.9648398.

R. Chaban et al., “Machine Learning Attack on Copy Detection Patterns: Are 1 × 1 Patterns Cloneable?” 2021 IEEE Int. Workshop Inf. Forensics, Secur. (WIFS), 2021, pp. 1–6, doi: 10.1109/WIFS53200.2021.9648387.

O. Taran, S. Bonev, and S. Voloshynovskiy, “Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach,” ICASSP 2019 - 2019 IEEE Int. Conf. Acoust. Speech, Signal Process. (ICASSP), 2019, pp. 2482–2486, doi: 10.1109/ICASSP.2019.8682967.

D.P. Kingma and J.L. Ba, “Adam: A Method for Stochastic Optimization,” 2017, arXiv:1412.6980v9.

S. Saidah, I.P.Y.N. Suparta, and E. Suhartono, “Modifikasi Convolutional Neural Network Arsitektur GoogLeNet dengan Dull Razor Filtering untuk Klasifikasi Kanker Kulit,” J. Nas. Tek. Elekt., Teknol. Inf., Vol. 11, No. 2, pp. 148–153, May 2022, doi: 10.22146/jnteti.v11i2.2739.

K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” 2016 IEEE Conf. Comput. Vis., Pattern Recognit., 2016, pp. 770–778, 2016, doi: 10.1109/CVPR.2016.90.

A. Paszke et al., “PyTorch: An Imperative Style, High-Performance Deep Learning Library,” in NIPS,19: Proceedings of the 33rd International Conference on Neural Information Processing Systems, H.M. Wallach et al., Eds., Red Hook, NY, USA: Curran Associates Inc., 2019, pp. 8026–8037.

Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-Based Learning Applied to Document Recognition,” Proc. IEEE, Vol. 86, No. 11, pp. 2278–23234, Nov. 1998, doi: 10.1109/5.726791.

Published
2023-02-22
How to Cite
Syukron Abu Ishaq Alfarozi, & Azkario Rizky Pratama. (2023). CNN-Based Model for Copy Detection Pattern Estimation and Authentication. Jurnal Nasional Teknik Elektro Dan Teknologi Informasi, 12(1), 44-49. https://doi.org/10.22146/jnteti.v12i1.6205
Section
Articles